Team,
We have created the NHIN Direct Security Overview document as part of the Documentation and Testing WG.
The link is http://nhindirect.org/NHIN+Direct+Security+Overview
The purpose of the document is to provide “A layman's explanation of trust circles and trust anchors, and how they can ensure security in NHIN Direct communications”.
Can you review this document and provide any feedback. We will target to go for consensus next week tentatively.
Please post any feedback on the wiki page itself and we will incorporate feedback appropriately.
Let us know if you need any additional information and we will be more than happy to provide.
Thanks
Dragon
I reviewed this, and have only one comment/question. The document discusses "end to end" security, but as I understand it, if a user entrusts his cert to a HISP external to his organization, the security can only be validated up to that HISP and not beyond, right? The non-repudiation is the HISP's non-repudiation of a user it *says* it represents via cert. I just want to make sure that we are clear about what and "end" means in "end to end" in this scenario.
Do I have that right, or am I misunderstanding something?
Noam
-----
Dr. Noam H. Arzt 858/538-2220 (voice)
President, HLN Consulting, LLC 858/538-2209 (FAX)
8449 Christopher Ridge Ter. ar...@hln.com
San Diego, CA 92127 http://www.hln.com/
John
-----Original Message-----
I assume "the term" you refer to is "end to end."
I was not suggesting changing it, just explaining/clarifying it.
But is my understanding correct?
Noam
John
Sorry for the delayed response. I saw John already respond to the topic.
My understanding is the same as yours in the specific case that you
brought up about delegating the cert's to be handled by a HISP. Like
John points out, the handling of certs/signing and encryption will
depend largely on the deployment model chosen..
Thanks
Dragon